an RBS Trials Biometric Fingerprint Bank Card By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 14:35:57 GMT Full Article headline bank password science cryptography scotland
an Man Plans To Fix Up Phone Booth After Finding Bottle In Ocean With Reward From 2600 Magazine By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 14:59:52 GMT Full Article headline hacker scotland
an Confused Brazilian Hacker Defaces NASA Web Sites In Protest Of NSA By packetstormsecurity.com Published On :: Tue, 17 Sep 2013 15:16:33 GMT Full Article headline hacker government nsa nasa
an The Truth About Mystery Trojan Found In Space By packetstormsecurity.com Published On :: Thu, 14 Nov 2013 02:59:58 GMT Full Article headline malware usa trojan russia space science nasa
an Five Years Later, Italian Police Identify Hacker Behind 2013 NASA Hacks By packetstormsecurity.com Published On :: Wed, 10 Oct 2018 15:45:54 GMT Full Article headline hacker usa data loss italy nasa
an Vista Kernel Fix Worse Than Useless By packetstormsecurity.com Published On :: Tue, 24 Oct 2006 01:44:24 GMT Full Article microsoft kernel
an David Kernell Photo - Rep. Mike Kernell Son Sarah Palin Anonymous Hacker? By packetstormsecurity.com Published On :: Fri, 19 Sep 2008 08:38:14 GMT Full Article hacker kernel
an TikTok Releases Transparency Report By packetstormsecurity.com Published On :: Thu, 02 Jan 2020 16:04:48 GMT Full Article headline government usa china spyware
an TikTok Banned By The US Army By packetstormsecurity.com Published On :: Fri, 03 Jan 2020 19:15:08 GMT Full Article headline usa china cyberwar spyware military
an Coronavirus Brings China's Surveillance State Out Of The Shadows By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 13:39:20 GMT Full Article headline government privacy virus china
an Afghanistan Suicide Bomber Attacks Nato Military Base By packetstormsecurity.com Published On :: Mon, 27 Feb 2012 15:24:08 GMT Full Article headline government usa terror afghanistan
an Afghanistan's Karzai Slams United States Over Massacre By packetstormsecurity.com Published On :: Fri, 16 Mar 2012 16:06:55 GMT Full Article headline government usa afghanistan
an Taiwan Bids To Bolster Security With Free Malware Database By packetstormsecurity.com Published On :: Mon, 02 Sep 2013 15:15:01 GMT Full Article headline government malware database taiwan
an Dropbox Used As Command And Control For Taiwan Time Bomb By packetstormsecurity.com Published On :: Mon, 30 Jun 2014 14:55:13 GMT Full Article headline malware botnet taiwan
an Hackers Steal $60m From Taiwanese Bank In Tailored SWIFT Attack By packetstormsecurity.com Published On :: Wed, 11 Oct 2017 13:11:34 GMT Full Article headline hacker bank cybercrime fraud taiwan
an Taiwanese Police Give Cyber-Security Quiz Winners Infected Devices By packetstormsecurity.com Published On :: Wed, 10 Jan 2018 14:41:41 GMT Full Article headline government malware taiwan
an Zero-Day Privilege Escalation Disclosed For Android By packetstormsecurity.com Published On :: Fri, 06 Sep 2019 14:45:45 GMT Full Article headline phone flaw google zero day
an Researchers Expose Another Instance Of Chrome Patch Gapping By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:41:05 GMT Full Article headline flaw google patch zero day
an Apple, Angry At Google, Hits Back At Hack Claims By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:41:28 GMT Full Article headline privacy malware phone flaw google apple zero day
an How Google Changed The Secretive Market For The Most Dangerous Hacks In The World By packetstormsecurity.com Published On :: Mon, 23 Sep 2019 16:54:39 GMT Full Article headline hacker flaw google zero day
an Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC By packetstormsecurity.com Published On :: Thu, 03 Oct 2019 14:13:26 GMT Full Article headline hacker government data loss cyberwar zero day
an NYPD Arrests Ninth Methbot Gang Member By packetstormsecurity.com Published On :: Sat, 25 Jan 2020 16:59:45 GMT Full Article headline malware usa cybercrime fraud
an Chinese Hackers Have Breached Online Betting And Gambling Sites By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 14:57:20 GMT Full Article headline hacker privacy china cybercrime fraud
an DoppelPaymer Ransomware Steals SpaceX/Tesla Supplier Data By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:42:12 GMT Full Article headline hacker malware cybercrime data loss fraud
an Advantech WebAccess dvs.ocx GetColor Buffer Overflow By packetstormsecurity.com Published On :: Wed, 24 Sep 2014 16:20:35 GMT This Metasploit module exploits a buffer overflow vulnerability in Advantec WebAccess. The vulnerability exists in the dvs.ocx ActiveX control, where a dangerous call to sprintf can be reached with user controlled data through the GetColor function. This Metasploit module has been tested successfully on Windows XP SP3 with IE6 and Windows 7 SP1 with IE8 and IE 9. Full Article
an Advantech WebAccess 7.2 Stack-Based Buffer Overflow By packetstormsecurity.com Published On :: Thu, 20 Nov 2014 16:34:36 GMT Core Security Technologies Advisory - Advantech WebAccess version 7.2 is vulnerable to a stack-based buffer overflow attack, which can be exploited by remote attackers to execute arbitrary code, by providing a malicious html file with specific parameters for an ActiveX component. Full Article
an Tango DropBox 3.1.5 Active-X Heap Spray By packetstormsecurity.com Published On :: Fri, 19 Jun 2015 15:39:30 GMT Tango DropBox active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects versions 3.1.5 and PRO. Full Article
an Tango FTP 1.0 Active-X Heap Spray By packetstormsecurity.com Published On :: Fri, 19 Jun 2015 15:41:56 GMT Tango FTP active-x heap spray exploit that leverages a vulnerability in the COM component used eSellerateControl350.dll (3.6.5.0) method of the GetWebStoreURL member. Affects version 1.0 build 136. Full Article
an Advantech WebAccess 8.0 / 3.4.3 Code Execution By packetstormsecurity.com Published On :: Mon, 07 Sep 2015 14:33:33 GMT Using Advantech WebAccess SCADA Software and attacker can remotely manage industrial control systems devices like RTU's, generators, motors, etc. Attackers can execute code remotely by passing a maliciously crafted string to ConvToSafeArray API in ASPVCOBJLib.AspDataDriven ActiveX. Full Article
an UCanCode Remote Code Execution / Denial Of Service By packetstormsecurity.com Published On :: Thu, 24 Nov 2016 01:34:22 GMT UCanCode has active-x vulnerabilities which allow for remote code execution and denial of service attacks. Full Article
an Facebook Suspends Tens Of Thousands Of Apps Over Privacy Issues By packetstormsecurity.com Published On :: Mon, 23 Sep 2019 16:52:46 GMT Full Article headline privacy facebook social
an Facebook Alleges Company Infiltrated Thousands For Ad Fraud By packetstormsecurity.com Published On :: Fri, 06 Dec 2019 16:13:45 GMT Full Article headline cybercrime fraud facebook social
an 15 Anonymous Suspects Arrested By Italian And Swiss Police By packetstormsecurity.com Published On :: Wed, 06 Jul 2011 14:27:49 GMT Full Article headline hacker italy anonymous switzerland
an Greek Journo Who Published List Of Swiss Bank Account Holders Cleared By packetstormsecurity.com Published On :: Fri, 02 Nov 2012 15:15:41 GMT Full Article headline privacy bank data loss switzerland greece
an US And UK Spooks Alerted Over Massive Swiss Data Leak By packetstormsecurity.com Published On :: Wed, 05 Dec 2012 03:19:41 GMT Full Article headline government usa britain data loss switzerland
an Truecrypt Is Alive And Well And Living In Switzerland By packetstormsecurity.com Published On :: Tue, 03 Jun 2014 01:48:34 GMT Full Article headline privacy cryptography switzerland
an MIT And CERN's Secure Webmail Plan Stumped By PayPal Freeze By packetstormsecurity.com Published On :: Tue, 01 Jul 2014 06:38:49 GMT Full Article headline email bank cybercrime fraud paypal switzerland
an Attackers Raid Swiss Banks With DNS And Malware Bombs By packetstormsecurity.com Published On :: Wed, 23 Jul 2014 15:04:55 GMT Full Article headline malware bank dns cybercrime fraud switzerland
an Kaspersky Lab To Shift US Customer Data From Russia To Switzerland By packetstormsecurity.com Published On :: Tue, 15 May 2018 09:38:10 GMT Full Article headline privacy usa virus russia switzerland
an Trafscrambler Anti-Sniffer For OS X By packetstormsecurity.com Published On :: Fri, 26 Jun 2009 17:47:47 GMT Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. This initial release implements SYN-decoy, Pre/Post connections SYN, TCP reset, and zero window attacks. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well. Full Article
an Trafscrambler Anti-Sniffer For OS X By packetstormsecurity.com Published On :: Sat, 15 Aug 2009 20:37:41 GMT Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well. Full Article
an Trafscrambler Anti-Sniffer For OS X By packetstormsecurity.com Published On :: Mon, 07 Sep 2009 15:48:16 GMT Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well. Full Article
an Anonymous Lashes Out At Norway Massacre Suspect By packetstormsecurity.com Published On :: Tue, 26 Jul 2011 04:32:40 GMT Full Article headline terror anonymous norway
an Norweigian Oil And Defense Industries Are Hit By A Major Cyber Attack By packetstormsecurity.com Published On :: Fri, 18 Nov 2011 16:43:19 GMT Full Article headline cyberwar norway
an 700,000 Choice Hotels Records Leaked In Data Breach, Ransom Demanded By packetstormsecurity.com Published On :: Thu, 15 Aug 2019 16:15:26 GMT Full Article headline privacy database data loss
an Virgin Media Exposes Thousands Of Database Records By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 15:01:43 GMT Full Article headline privacy database data loss
an Another File Integrity Checker 2.13-1 By packetstormsecurity.com Published On :: Wed, 21 Jan 2009 01:47:16 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
an Another File Integrity Checker By packetstormsecurity.com Published On :: Tue, 28 Jul 2009 15:00:09 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
an Another File Integrity Checker 2.15 By packetstormsecurity.com Published On :: Sat, 24 Apr 2010 02:44:33 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article
an Another File Integrity Checker 2.16 By packetstormsecurity.com Published On :: Wed, 15 Dec 2010 11:07:22 GMT afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided. Full Article